Print Catalog:

Programs in Technology Law



Filter by State
Filter by Category
 
 

Data Privacy Challenges in Global Employment Management: A Guide for In-House Attorneys

Program Number: 2520 Presenter: Jana Fuchs, Esq., David A. Zetoony, Esq.

This presentation and interactive case study focuses on the challenges companies have to solve when operating a global HR system. Topics include the regulatory framework for collection and processing of personal employee data, the transfer of such data within a corporate group, purpose limitation and conflicts of law. In particular, Part I covers: • Introduction to the legal framework for data transfers (2-Stage Assessment) -Stage 1 – Processing of Employee data (with practice examples) -Stage 2 – Transfer of Employee data (with practice examples) • Overview – Adequate data protection guarantees (Safe Harbor, Model Clauses, BCR) • Discussion part - Challenges for HR management (with practice examples) • Outlook – EU Privacy Regulation and its potential effects Part II covers a sample case study.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Data Privacy, Data Security, and Cloud and IT Vendor Agreements: A Guide for In-House Counsel

Program Number: 2519A Presenter: Jason D. Haislmaier, Esq.

The services provided by cloud computing, hosting, data storage, outsourcing, and other information technology (IT) vendors have become fundamental resources for most companies. Data privacy and data security issues have rapidly risen to the forefront in vendor agreements for these services and are now often among the most hotly contested provisions in those agreements. Join Jason Haislmaier of Bryan Cave LLP as he discusses some of the more significant data privacy and data security issues that can arise in cloud and IT vendor agreements and how to draft and negotiate provisions in the agreements for mitigating the risks caused by those issues.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What In-House Counsel Should Know about Data Privacy and Data Security in a Big Data World

Program Number: 2518 Presenter: Jason D. Haislmaier, Esq.

The term “Big Data” has become synonymous with the ability to rapidly analyze large volumes of data to predict outcomes and draw other insights. Big Data has grown exponentially as the insights reaped from data analysis have become crucial to the success of many companies. With this growth have come a number of data security and data privacy considerations and requirements for companies involved with big data. Join Jason Haislmaier of Bryan Cave LLP for a discussion of these considerations and requirements, including established and emerging legal standards, regulatory requirements, and best practices for data privacy and data security in a “Big Data” world.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Data Breach Investigations: Ethical Considerations for In-House Counsel when Publicly Reporting a Security Incident

Program Number: 2512 Presenter: Jennifer Kies Mammen, Esq., Jena M. Valdetero, Esq, David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** David Zetoony, Jena M. Valdetero and Jennifer Mammen discuss ethical issues that typically arise when an organization considers whether to report a security incident and what information about the incident should be publicly conveyed. Topics include questions of confidentiality and conflict in the context of managing public relations/communications consultants, determining whether to report an incident, and communicating with law enforcement. Specific ethical rules, cases, opinions to be discussed include: ABA Model Rules (e.g., Confidentiality of Information (1.6), Conflict of Interest (1.7), Organization as client (1.13), Duties to prospective client (1.18), Advisor (2.1), Lawyer as witness (3.7), Truthfulness in statements to others (4.1)); Upjohn; and various state bar ethics opinions.

$95.00Audio CD Add to Cart

Data Security and Credit Cards for In-House Counsel: How Your Organization’s Contractual Relationship with Credit Card Processors Is Changing

Program Number: 2510 Presenter: Jennifer L. Crowder, Esq., Courtney K. Stout, Esq.

A liability shift is forcing credit and debit card transactions to be conducted using chip-based (i.e., EMV) payment cards by 2015. This transition could impact your organization in more ways than one. Join us for this important discussion of new requirements of the payment card network rules (i.e., Visa, MasterCard, American Express and Discover), the Payment Card Industry Data Security Standards (PCI DSS), and President Obama’s Executive Order (October 2014) regarding chip technology, and for additional measures (a combination of EMV, Tokenization and Encryption) that can be taken to increase your organization’s data security practices and procedures for your credit and debit card processing and Corporate Purchasing Card programs.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Data Breach Investigations: Ethical Considerations for In-House Counsel when Investigating a Security Incident

Program Number: 2508 Presenter: Jennifer Kies Mammen, Esq., Jena M. Valdetero, Esq, David A. Zetoony, Esq.

Data security breaches are now unavoidable. The question is whether in-house counsel are prepared to deal with a breach when it occurs. In addition to the legal and practical questions that arise from a data breach, in-house counsel must often navigate several ethical dilemmas. David Zetoony, Jena M. Valdetero and Jennifer Mammen discuss ethical issues that typically arise when investigating a security incident. These include coordinating an incident response, interactions with employees that may be responsible for causing a security incident, and managing external resources such as forensic investigators and outside counsel. The program focuses on issues of confidentiality and conflicts. Specific ethical rules, cases, opinions to be discussed include: ABA Model Rules (e.g., Confidentiality of Information (1.6), Conflict of Interest (1.7), Organization as client (1.13), Duties to prospective client (1.18), Advisor (2.1), Lawyer as witness (3.7), Truthfulness in statements to others (4.1)); Upjohn; and various state bar ethics opinions.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Ban-the-Box and Other Pre-Employment Dilemmas: Finding Qualified Candidates without Finding Trouble

Program Number: 2507 Presenter: Natasha B. Dorsey, Esq., John L. Litchfield, Esq., Christopher G. Ward, Esq.

Finding qualified applicants for jobs is a constant challenge for employers for reasons going well past identifying individuals with the necessary skills, experience, training and education. Beyond finding strong candidates for particular positions, employers also have responsibilities to identify candidates who fit with a company’s culture, who will work well with others, and who will be trustworthy and help solve, rather than create, employment-related issues. As a result, many employers have adopted processes designed to identify latent issues with applicants, such as criminal history inquiries and background checks. While for many years employers took these steps with relatively limited legal restriction or government oversight, trends such as “ban-the box” are now sweeping across the country, and agencies like the Equal Employment Opportunity Commission are taking aggressive action to combat perceived areas for potential discrimination and unfairness in pre-employment inquiries. In this program of particular interest to in-house lawyers, Foley &

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Litigation Holds: The Ethical Challenges Counsel Continue to Face

Program Number: 2455 Presenter: Irene Savanis Fiorentinos, Esq., Morgan R. Hirst, Esq.

In-house counsel as well as outside counsel must continue to address the ethical questions and pitfalls involved in the need to issue and follow litigation holds. Join Jones Day attorneys Irene Fiorentinos and Morgan Hirst as they provide an update on key preservation and spoliation decisions in this important program for all attorneys. ABA Model Rules of Professional Conduct 1.1, 3.2 and 3.4, Federal Rule of Civil Procedure 26, and case law, including Chin v. Port Auth. of N.Y. & N.J., 685 F.3d 135 (2d Cir. 2012), are discussed as they apply to proper preservation.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

The Changing Face of Privacy Law in the Internet of Things (IoT)

Program Number: 2452 Presenter: Jason D. Haislmaier, Esq.

The “Internet of Things” has brought countless interconnected devices and services into our daily lives and is also producing explosive changes in the way personal data is collected, shared, and used. These changes have created new challenges for businesses, whether they are involved in providing or using IoT technology. Join Jason Haislmaier for a discussion of these challenges and the established and emerging legal standards, regulatory requirements, and best practices for data privacy in the Internet of Things.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

How In-House Counsel Can Be Ready for the Legal Issues that Arise Following a Credit Card Breach

Program Number: 2449 Presenter: David A. Zetoony, Esq.

The truth is that you can no more prevent a data breach than other types of crime against your organization such as robbery or theft. In-house counsel can have a huge impact, however, on the impact that a data breach has on an organization, including how quickly the organization identifies, investigates, and remediates a breach; how an organization communicates with partners, impacted individuals, regulators, and the media; whether the organization complies with contractual and regulatory obligations; and minimizing the potential for class actions and/or potential liability if litigation is filed. Join Bryan Cave partner David Zetoony, who examines 10 key legal documents which have an impact on an organization’s ability to effectively respond to a data breach and explains the significance of each document, how the document comes into play after a breach occurs, and what provisions within each document to be familiar with before a breach.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart